{"id":1054,"date":"2019-12-01T01:43:48","date_gmt":"2019-12-01T09:43:48","guid":{"rendered":"http:\/\/cetinkoc.net\/blog\/?p=1054"},"modified":"2022-05-03T21:54:47","modified_gmt":"2022-05-04T04:54:47","slug":"yet-another-plagiarism","status":"publish","type":"post","link":"https:\/\/cetinkayakoc.net\/blog\/yet-another-plagiarism\/","title":{"rendered":"Yet another plagiarism"},"content":{"rendered":"\n<p>Access to Internet and hundreds of repositories on it gives ample opportunities to people to copy-paste articles and claim as one&#8217;s own. Often a few paragraphs, tables, or figures are plagiarised, and not-so-often but still common is the case almost an entire article is stolen. <\/p>\n\n\n\n<p>This happened to my PhD student and co-author Wangchen Dai. Our article in which he is the first author was published in <em>IEEE Transactions on Computers<\/em> in 2017. The citation is:<\/p>\n\n\n\n<p>W. Dai, D. D. Chen, R. C. C. Cheung, and \u00c7. K. Ko\u00e7.  Area-time efficient architecture of FFT-based Montgomery multiplication. <em>IEEE Transactions on Computers,<\/em> 66(3):375-388, March 2017.<\/p>\n\n\n\n<p>The PDF of our original article is found here: <a rel=\"noreferrer noopener\" aria-label=\"http:\/\/cetinkoc.net\/docs\/j79.pdf (opens in a new tab)\" href=\"http:\/\/cetinkoc.net\/docs\/j79.pdf\" target=\"_blank\">https:\/\/cetinkayakoc.net\/docs\/j79.pdf<\/a> <\/p>\n\n\n\n<p>Recently an email from Google Scholar wrote that 2 Indian researchers (K. K. Kumari and V. Ramesh) from Vaagdevi Institute of Technology &amp; Science published an article in so-called <em>International Journal of Research in Advanced Engineering Technologies<\/em>, pages 43-52, Volume 6, Issue 9, April 2018. The title is &#8220;Design of an efficient FFT-based Montgomery multiplication&#8221;. These  imbecile plagiarists took screenshots of the algorithm descriptions, tables and figures from our article, and copy-pasted the text. There was a PDF link of the article but now it is broken. In fact, even the web site of the journal disappeared.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access to Internet and hundreds of repositories on it gives ample opportunities to people to copy-paste articles and claim as<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-1054","post","type-post","status-publish","format-standard","hentry","category-cryptography","category-humans"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts\/1054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/comments?post=1054"}],"version-history":[{"count":5,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts\/1054\/revisions"}],"predecessor-version":[{"id":1641,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/posts\/1054\/revisions\/1641"}],"wp:attachment":[{"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/media?parent=1054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/categories?post=1054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cetinkayakoc.net\/blog\/wp-json\/wp\/v2\/tags?post=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}